<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><title>TPHOLs 2009</title><script src="http://maps.google.com/maps?file=api&v=2&key=ABQIAAAAPK7aMC4FDjV_GNRHDThC1BTTdYAvEcsK2WWznOVPgLglzb1KQhR1cqhbUMaTXEN7XtSXuQxbViAeQg" type="text/javascript"></script> <script type="text/javascript"> function initialize() { if (GBrowserIsCompatible()) { var map = new GMap2(document.getElementById("map_canvas")); var TUM = new GLatLng(48.12954444444, 11.588652777777778); map.setCenter(TUM, 0); map.setMapType(G_HYBRID_MAP); map.addControl(new GSmallMapControl()); map.addOverlay(new GMarker(TUM)); } } </script></head><BODY TEXT="#000000" BGCOLOR="#4169E1" LINK="#0000EF" VLINK="#51188E" ALINK="#FF0000" onload="initialize()" onunload="GUnload()"><TABLE WIDTH="100%" BGCOLOR="#4169E1" BORDER="0" FRAME="border" CELLPADDING="10" CELLSPACING="2" RULES="all"><!-- left column --><TR><TD BGCOLOR="#FFFFFF" WIDTH="20%" VALIGN="TOP" ROWSPAN="2"><p align=center><a href="pictures/marienplatz.jpg"><img src="pictures/marienplatz_small.jpg" alt="Marienplatz" border=0></a><br><small>Marienplatz (city centre)</small><br></p><p align=center><a href="pictures/englischer_garten.jpg"><img src="pictures/englischer_garten_small.jpg" alt="Englischer Garten" border=0></a><br><small>The English Garden</small><br></p><p align=center><a href="pictures/chinesischer_turm.jpg"><img src="pictures/chinesischer_turm_small.jpg" alt="Chinesischer Turm" border=0></a><br><small>Chinese Tower (famous beer garden)</small><br></p><p align=center><a href="pictures/cs_building.jpg"><img src="pictures/cs_building_small.jpg" alt="Computer science building" border=0></a><br><small>The Computer Science building of the TUM</small><br></p><p align=center><a href="pictures/magistrale.jpg"><img src="pictures/magistrale_small.jpg" alt="Main hall of the computer science building" border=0></a><br><small>The main hall in the CS-building</small><br></p><p align=center><a href="pictures/isar.jpg"><img src="pictures/isar_small.jpg" alt="The river Isar" border=0></a><br><small>The Isar river</small><br></p><p align=center><A HREF="pictures/tphols09_poster.jpg"><IMG ALT="poster" SRC="pictures/tphols09_poster_small.jpg" align="top"></A><BR><small>The conference poster</small><br></p></TD><!-- right column --><TD BGCOLOR="#FFFFFF" WIDTH="75%" VALIGN="TOP"><H3>SPEAKER: David Basin</H3><H3>TITLE: Let's get physical: models and methods for real-world security protocols</H3>(Joint work with Patrick Schaller, Benedikt Schmidt, and Srdjan Capkun)<p>Traditional security protocols are mainly concerned with key establishment andprincipal authentication, and rely on predistributed keys and properties ofcryptographic operators. In contrast, new application areas are emerging thatestablish and rely on properties of the physical world. Examples includesecure localization, distance bounding, and device pairing protocols.</p><p>We present a formal model extending standard, inductive, trace-based, symbolicapproaches in two directions. In terms of communication, we refine thestandard Dolev-Yao model to account for network topology, transmission delays,and node positions. This results in a distributed intruder with restricted,but more realistic, communication capabilities. On the level of messages, weuse an abstract message theory to establish facts independent of the concreteprotocol and message theory. To analyse the security of a given protocol, weinstantiate the abstract message theory so that properties of thecryptographic operators under consideration are accurately modeled. Wedescribe the formalization of this model in Isabelle/HOL and present itsapplication to a distance bounding protocol, where the concrete message theoryincludes exclusive-or and its associated equational theory.</p></TD></TABLE><hr><!-- Created: Thu Feb 28 19:21:12 CET 2008 --><!-- hhmts start -->Last modified: Wed Apr 29 19:18:31 CEST 2009<!-- hhmts end --><a href="http://validator.w3.org/check/referer">[Validate this page.]</a></body></html>